System and method for securing a program's execution in a network environment
First Claim
Patent Images
1. A computer-implemented method for signing a first archive file, said method comprising:
- selecting one of a plurality of security algorithms for use with said first archive file;
computing a signature for said first archive file according to said selected security algorithm; and
creating a new archive file comprising said first archive file, said selected security algorithm and said signature.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method is provided for managing security on a server that receives code for execution. A security manager resides on a server and determines whether to permit the execution of a servlet based on a characteristic of the servlet. The security manager makes this determination by performing a number of security checks implemented as a security policy that is configured based on the servlet'"'"'s network source.
-
Citations
10 Claims
-
1. A computer-implemented method for signing a first archive file, said method comprising:
-
selecting one of a plurality of security algorithms for use with said first archive file;
computing a signature for said first archive file according to said selected security algorithm; and
creating a new archive file comprising said first archive file, said selected security algorithm and said signature. - View Dependent Claims (2, 3)
-
-
4. A computer-readable medium containing instructions for performing a method for causing a computer system to sign a first archive file, said method comprising:
-
selecting one of a plurality of security algorithms for use with said first archive file;
computing a signature for said first archive file according to said selected security algorithm; and
creating a new archive file comprising said first archive file, said selected security algorithm and said signature.
-
-
5. A computer-implemented method for validating a signed archive file comprising an included archive file, an associated security algorithm and a signature, said method comprising:
-
extracting said included archive file, said associated security algorithm, and said signature from said signed archive file, wherein the associated security algorithm is selected from one of a plurality of security algorithms for use with said included archive file;
calculating a value for said included archive file according to said associated security algorithm;
extracting a corresponding value from said signature; and
determining said archive file as valid when said calculated value and said extracted corresponding value compare equal. - View Dependent Claims (6)
-
-
7. A computer-readable medium containing instructions for performing a method for causing a computer system to validate a signed archive file comprising an included archive file, an associated security algorithm and a signature, said method comprising:
-
extracting said included archive file, said associated security algorithm, and said signature from said signed archive file, wherein the associated security algorithm is selected from one of a plurality of security algorithms for use with said included archive file;
calculating a value for said included archive file according to said associated security algorithm;
extracting a corresponding value from said signature; and
determining said archive file as valid when said calculated value and said extracted corresponding value compare equal.
-
-
8. A computer system comprising:
-
a medium for data storage wherein is located a computer program for causing a computer system to validate a signed archive file comprising an included archive file, an associated security algorithm and a signature by extracting said included archive file, said associated security algorithm, and said signature from said signed archive file, wherein the associated security algorithm is selected from one of a plurality of security algorithms for use with said included archive file;
calculating a value for said included archive file according to said associated security algorithm;
extracting a corresponding value from said signature; and
determining said archive file as valid when said calculated value and said extracted corresponding value compare equal; and
a CPU couple to said medium, for executing computer programs.
-
-
9. A medium for data storage comprising:
-
a first program for creating a first archive file;
a second program for selecting one of a plurality of security algorithms for use with said first archive file;
computing a signature for said first archive file according to said selected security algorithm; and
creating a new archive file comprising said first archive file, said selected security algorithm and said signature; and
a CPU, coupled to said data storage medium, for executing computer programs.
-
-
10. A computer-implemented method for signing a first archive file, said method comprising:
-
selecting one of a plurality of security algorithms for use with said first archive file;
computing a signature for said first archive file according to said selected security algorithm; and
creating a new archive file comprising said first archive file, said selected security algorithm, said signature, and a certificate.
-
Specification